ISPEC C

35 papers

YearTitle / Authors
2005A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection.
Zonghua Zhang, Hong Shen
2005A New Class of Codes for Fingerprinting Schemes.
Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau
2005A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications.
Kung Chen, Chih-Mao Huang
2005A Restricted Multi-show Credential System and Its Application on E-Voting.
Joseph K. Liu, Duncan S. Wong
2005A Task-Oriented Access Control Model for WfMS.
Xu Liao, Li Zhang, Stephen Chi-fai Chan
2005An Email Worm Vaccine Architecture.
Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo
2005An Empirical Study on the Usability of Logout in a Single Sign-on System.
Mikael Linden, Inka Vilpola
2005An Identity-Based Grid Security Infrastructure Model.
Xiaoqin Huang, Lin Chen, Linpeng Huang, Minglu Li
2005An Open Approach for Designing Secure Electronic Immobilizers.
Kerstin Lemke, Ahmad-Reza Sadeghi, Christian Stüble
2005Computer Vulnerability Evaluation Using Fault Tree Analysis.
Tao Zhang, Mingzeng Hu, Xiao-chun Yun, Yongzheng Zhang
2005Conformance Checking of RBAC Policy and its Implementation.
Frode Hansen, Vladimir A. Oleshchuk
2005Countermeasures for Preventing Comb Method Against SCA Attacks.
Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau
2005Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks.
Rasool Jalili, Fatemeh Imani-Mehr, Morteza Amini, Hamid Reza Shahriari
2005Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model.
Bin Liang, Heng Liu, Wenchang Shi, Yanjun Wu
2005Hiding Data in Binary Images.
Chin-Chen Chang, Chun-Sen Tseng, Chia-Chen Lin
2005Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings
Robert H. Deng, Feng Bao, HweeHwa Pang, Jianying Zhou
2005Measuring Resistance to Social Engineering.
Hågen Hasle, Yngve Kristiansen, Ketil Kintel, Einar Snekkenes
2005Model Redundancy vs. Intrusion Detection.
Zhuowei Li, Amitabha Das, Sabu Emmanuel
2005Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach.
Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati
2005On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes.
Zuowen Tan, Zhuojun Liu, Mingsheng Wang
2005POSSET - Policy-Driven Secure Session Transfer.
Philip Robinson, Christian Schaefer, Thomas Walter
2005Performance Analysis of CDMA-Based Watermarking with Quantization Scheme.
Yanmei Fang, Limin Gu, Jiwu Huang
2005Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications.
Heejin Park, Sang-Kil Park, Ki-Ryong Kwon, Dong Kyue Kim
2005Protecting Mass Data Basing on Small Trusted Agent.
Fangyong Hou, Zhiying Wang, Kui Dai, Yun Liu
2005Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks.
Hany A. Samuel, Yasser H. Dakroury, Hussein I. Shahein
2005Risk Assessment of Production Networks Using Honeynets - Some Practical Experience.
Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann
2005Robust Routing in Malicious Environment for Ad Hoc Networks.
Zhongchao Yu, Chuk-Yang Seng, Tao Jiang, Xue Wu, William A. Arbaugh
2005Secure Software Delivery and Installation in Embedded Systems.
André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi
2005Security On-demand Architecture with Multiple Modules Support.
Yanjun Wu, Wenchang Shi, Hongliang Liang, Qinghua Shang, Chunyang Yuan, Bin Liang
2005Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation.
Patrick P. Tsang, Victor K. Wei
2005Token-Controlled Public Key Encryption.
Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
2005Towards Multilateral-Secure DRM Platforms.
Ahmad-Reza Sadeghi, Christian Stüble
2005Tracing Traitors by Guessing Secrets. The
Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau
2005Using Trust for Restricted Delegation in Grid Environments.
Wenbao Jiang, Chen Li, Shuang Hao, Yiqi Dai
2005Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures.
André Adelsbach, Sebastian Gajek, Jörg Schwenk